Abstract
Security is an important but challenging issue in current network environments. With the growth of Internet, application systems in enterprises may suffer from new security threats caused by external intruders. This situation results in the introduction of security auditors (SAs) who perform some test methods with hacking tools the same as or similar to those used by hackers. However, current intrusion detection systems (IDSs) do not consider the role of security auditors despite its importance. This causes IDSs to generate many annoying alarms. In this paper, we are motivated to extend a current IDS functionality with Identification Capability, called IDSIC, based on the auditing viewpoint to separate auditing traffic from malicious attacks. The IDSIC architecture includes two components: fingerprint adder and fingerprint checker, which can provide a separability of security auditors and hackers. With this architecture, we show that IDSICs can lower the consequential costs in the current IDSs. Therefore, such IDSICs can ensure a more stable system performance during the security examination process.
Similar content being viewed by others
References
Symantec Internet Security Threat Report Volume IX, March 2006 (2006), https://www.enterprise.symantec.com/enterprise/whitepaper.cfm?id=2238
Gehani A., Kedem, G.: RheoStat: real-time risk management. In: Proceedings of Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, pp. 296–314 (2004)
BS 7799/ISO 27001:2005, http://www.bsi-global.com/Global/ iso27001.xalter (2005)
COBIT http://www.isaca.org/
ISACA Standards Board IS Auditing Guideline, http://www. isaca.org
Deshpande, Y., Chandrarathna, A., Ginige, A.: Web site auditing—first step towards re-engineering. In: Proceedings of SEKE’02, pp. 731–737 (2002)
Chen, P.T., Tseng, B., Laih, C.S.: A modeling of intrusion detection system with identification capability. In: Lee, D.T., Shieh, S.P., Tygar, J.D. (eds.) Computer Security in the 21st Century ISBN: 0-387-24005-5 (2005)
Fan, W., Lee, W., Stolfo, S., Miller, M.: A multiple model cost- sensitive approach for intrusion detection. In: Proc. Eleventh European Conference of Machine Learning, Barcelona Spain, pp. 148–156 (2000)
Lee, W., Fan, W., Miller, Matt, Stolfo, Sal, Zadok, E.: Toward cost sensitive modeling for intrusion detection and response. J. Comput. Security 10, (2002)
Denning D.E. (1987). An intrusion-detection model. IEEE Trans. Softw. Eng. SE- 13(2): 222–232
Newman, D., Snyder, J., Thayer, R.: Crying wolf: false alarms hide attacks, http://www.nwfusion.com/techinsider/2002/ 0624security1.html (2002)
Bace, R., Mell, P.: NIST Special Publication on Intrusion Detection System, http://www.csrc.nist.gov/publications/nistpubs/ 800-31/sp800-31.pdf (2001)
Verwoerd T. and Hunt R. (2002). Intrusion detection techniques and approaches. Comput. Commun. 25: 1356–1365
Debar H., Dacier M. and Wespi A. (2000). A revised taxonomy for intrusion detection systems. Ann. Telecommun. 55: 361–378
Cannady, J.: An Adaptive Neural Network Approach to Intrusion Detection and Response. Ph.D Thesis, Nova Southeastern University (2000)
Anderson T., Roscoe T. and Wetherall D. (2004). Preventing Internet Denial-of-Service with Capabilities. ACM SIGCOMM Computer Communication Review (CCR) 34(1): 39–44
Lippmann, R.P., Fried, D.J., Graf, I., et al.: Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation. In: Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (2000)
Nessus, http://www.nessus.org/
Nikto, http://www.cirt.net/code/nikto.shtml
Xfocus, http://www.xfocus.org/exploits/
Wang X. and Yu H (2005). How to Break MD5 and Other Hash Functions, Eurocrypt 2005, LNCS 3494. Springer, Heidelberg
Stallings, W.: Cryptography and Network Security, 4/E. Chap 11. ISBN 0-13-187316-4 (2006)
Krawczyk, H., Bellare M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication. Internet RFC 2104 (1997)
PacketStorm, http://www.packetstormsecurity.org/
Packet Length Distributions. Available at http://www.caida.org/analysis/AIX/plen_hist/on August 2004 (2004)
Lee, W., Miller, M., Stolfo, S., et al.: Toward cost-sensitive modeling for intrusion detection. Columbia University Computer Science Technical Report CUCS-002-00 (2000)
Cabrera, J.B.D., Gosar, J., Lee, W., Mehra, R.K.: On the statistical distribution of processing times in network intrusion detection. In: Proceedings of The 43rd IEEE Conference on Decision and Control (CDC 2004), Bahamas, December 2004 (2004)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography, Chap 12 (1997)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chen, PT., Laih, CS. IDSIC: an intrusion detection system with identification capability. Int. J. Inf. Secur. 7, 185–197 (2008). https://doi.org/10.1007/s10207-007-0024-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-007-0024-z